UTC: 00:00:00
SID: UNAUTHEN...
SYNC_ID: --
ENCRYPTION: ACTIVE (AES-256)
DEFCON: Lvl 4
● LIBR_ENGINE: DETECTED_DIP [$14,500 RECOVERED] ● ENTITY_RESOLUTION: FLAGGED_CRYPTO_TRANSFER [COINBASE -> UNKNOWN_WALLET] ● INTEL_ANALYSIS: BLOCKED_HOSTILE_TEXT [RISK_LEVEL: HIGH] ● ALERT: NEW_OFFSHORE_NODE_IDENTIFIED ● SYSTEM_STATUS: ENCRYPTION_ACTIVE (AES-256) ● LIBR_ENGINE: DETECTED_DIP [$14,500 RECOVERED] ● ENTITY_RESOLUTION: FLAGGED_CRYPTO_TRANSFER [COINBASE -> UNKNOWN_WALLET]
Legal Agreement

Terms of Service

Effective Date: January 15, 2026

1. Acceptance of Terms

By creating an account, accessing, or using the Exit Protocol platform ("Service"), you agree to be bound by these Terms of Service ("Terms"). If you do not agree to these terms, you must not use our Service.

We reserve the right to modify these terms at any time. Material changes will be communicated via the email address associated with your account. Continued use of the Service after notification constitutes acceptance of updated terms.

3. Nature of the Platform: Deterministic vs. Generative

Exit Protocol's core forensic engine — including the LIBR tracing algorithm, the Impeachment Engine, and the Entity Resolution Graph — operates on deterministic mathematical processing. These modules apply fixed, invariable rules to structured data. They do not guess, estimate, or generate probabilistic output. The LIBR engine enforces the strict formula St = min(St-1, Bt), where St is the traceable separate property on day t and Bt is the actual account balance.

Separately, certain ancillary features — including the Grand Strategist (narrative generation), AI Judge (sentiment analysis), BIFF Filter (tone rewriting), and Judicial Temperature — utilize probabilistic Large Language Models (Google Gemini 2.0 Flash). These AI features produce suggestions and drafts that must be reviewed by qualified human professionals before reliance in any legal proceeding.

4. Forensic Accuracy & Module Limitations

The Service utilizes multiple automated modules for forensic analysis. Each module has specific limitations you must understand.

4.1 Spatial-Grid OCR (Document Ingestion)

The document extraction pipeline (powered by Azure Document Intelligence and Surya OCR) uses spatial-grid analysis to reconstruct tabular data from scanned bank statements, including degraded, skewed, or multi-generational PDFs. Despite this sophistication, OCR may occasionally misinterpret characters (e.g., reading a "6" as an "8") due to poor scan quality. You explicitly agree to audit all extracted financial figures against original source documents. We are not liable for calculation errors resulting from OCR inaccuracies.

4.2 LIBR Tracing Engine (Module 04)

The core tracing engine algorithmically applies the Lowest Intermediate Balance Rule across the complete transactional history. The engine is immune to the "replenishment fallacy" — once an exhaustion event permanently reduces the separate property claim, subsequent community deposits cannot restore it. While mathematically precise, the LIBR output requires a qualified professional to validate the accuracy of the underlying input data.

4.3 Grand Strategist (Module 01 — Narrative Engine)

The Grand Strategist translates LIBR output into structured "Statements of Facts" and dissipation arguments using AI. These are draft documents intended to assist legal professionals — not court-ready submissions in their raw form. All AI-generated narratives must be reviewed and approved by a licensed attorney.

4.4 Impeachment Engine (Module 03)

The Impeachment Engine cross-references imported transactions against figures stated in a party's sworn financial disclosure or affidavit. If discrepancies are detected (e.g., a stated monthly expense of $5,000 vs. a calculated moving average of $14,000), the system flags the contradiction. These automated findings are preliminary indicators — they do not constitute proof of perjury and must be independently verified before use in deposition or trial.

4.5 Entity Resolution Graph (Module 05)

The Entity Resolution Graph maps fund transfers through intermediaries, shell entities, and cryptocurrency nodes using link analysis. While the graph provides a visual representation of financial flows, it does not independently verify the ownership or legal character of destination accounts. You should not assume that a mapped transfer constitutes evidence of asset concealment without independent investigation.

4.6 Leakage Analysis

The AI-powered Leakage Analysis detects gaps between reported income (W-2, 1099) and estimated lifestyle spending. A negative discrepancy does not constitute proof of hidden income — it is a mathematical indicator that warrants further forensic investigation.

4.7 Sentinel Engine (Automated Alerts)

The Sentinel monitoring system uses deterministic rule-based detection to flag potentially suspicious financial activity (e.g., large transfers, cryptocurrency purchases, gambling transactions). Alerts are heuristic in nature and may produce both false positives and false negatives. Alerts do not constitute evidence of wrongdoing.

4.8 Shadow Report (Redaction & Metadata Analysis)

The Shadow Report inspects the underlying layer structure of uploaded documents to detect ghost text layers (unflatted redactions), embedded XMP metadata (author, creation timestamps, producer software), and EXIF data in embedded images (GPS coordinates, camera models). This analysis is best-effort and does not guarantee detection of all hidden content or data leakage.

5. Security, Encryption & Data Loss

We employ AES-256 (Fernet) encryption for data at rest, including evidence files and sensitive database fields. SHA-256 cryptographic hashing provides an immutable chain-of-custody verification for all uploaded documents — the hash is embedded in every Forensic Report to provide courts with cryptographic proof that evidence has not been altered since ingestion. However, your data security ultimately depends on your management of credentials.

5.1 Duress Passwords

The "Duress Password" feature is provided "as-is." While designed to protect user safety by loading an alternate environment, we cannot guarantee it will withstand all forensic examination scenarios.

5.2 Access Controls

The platform supports role-based access control (Paralegal, Forensic Accountant, Auditor) with optional IP whitelisting. You are responsible for configuring and maintaining appropriate access controls for your organization's users.

5.3 Audit Logging & SIEM

All user actions generate immutable audit log entries. Enterprise users may configure asynchronous log forwarding to external SIEM platforms (e.g., Splunk, Datadog). Exit Protocol is not responsible for the availability or performance of third-party SIEM services.

5.4 Sovereign Mode

The entire application is containerized and can be deployed as an air-gapped system via Docker. This "Bring Your Own Key" (BYOK) model allows law firms to run forensic analysis locally on their own hardware. Under Sovereign deployment, no sensitive financial data traverses the public internet.

6. Third-Party API Integrations

Exit Protocol allows you to connect third-party services to securely ingest data for forensic analysis. By authorizing these connections via standard OAuth 2.0 protocols, you grant Exit Protocol permission to retrieve data strictly on your behalf.

6.1 Clio Manage Integration

  • Read-Only Access: Exit Protocol retrieves matters and documents from Clio using read-only OAuth 2.0 scopes (matter:read, document:read). We do not modify, delete, or overwrite any records in Clio.
  • Token Lifecycle: You may revoke API access at any time through Clio's dashboard or within Exit Protocol's settings.

6.2 Financial Data Providers (Plaid)

  • Read-Only Telemetry: When connecting financial institutions via Plaid, Exit Protocol operates strictly in a read-only capacity. We retrieve transaction history and account balances but never initiate transfers or modify account settings.
  • Data Accuracy: Exit Protocol is not responsible for the accuracy, completeness, or timeliness of data provided by Plaid or your financial institution.

6.3 Indemnification

Exit Protocol is not responsible for outages, data losses, or API changes caused by any third-party provider. Our liability is restricted solely to the data once it has been securely received within our platform.

7. Payments & Refunds

7.1 Freemium Access

Core platform features are available at no cost. No credit card is required to create an account. Free access includes:

  • Case management and evidence upload
  • Initial LIBR tracing and financial analysis
  • Communication analysis tools (The Response Shield / BIFF Filter)
  • Sentinel monitoring and automated alerts
  • Shadow Report redaction auditing
  • AI Judge and Grand Strategist modules

7.2 Forensic Report Certification ($497)

The generation of court-ready, certified Forensic Reports — including SHA-256 cryptographic integrity verification, immutable chain-of-custody documentation, and professional-grade PDF output — is a premium service priced at $497 per report, processed via Audit Express. This fee covers the certification and cryptographic signing of a single LIBR separate property tracing dossier. Once a report has been generated, the fee is non-refundable.

7.3 Enterprise Licensing (Sovereign Mode)

Enterprise "Sovereign" licenses are one-time purchases for air-gapped, containerized deployment. Support and maintenance contracts are billed annually and are non-refundable once the service period has commenced.

Limited Evidentiary License & Report Valuation

8. Demo Sandbox

Exit Protocol provides a "Demo Sandbox" populated with synthetic financial data, allowing attorneys and pro se litigants to test the platform's capabilities without making any financial commitment. The Demo Sandbox:

  • Contains only synthetic, non-real financial data.
  • Does not represent any actual person, company, or financial institution.
  • Demonstrates the full analytical pipeline but does not generate certified reports.
  • May be modified or discontinued at our discretion.

9. Prohibited Use

You agree not to use the Service for:

  • Illegal Concealment: Using the platform to actively hide assets in violation of a court order or discovery request.
  • Fabrication: Using the reporting tools to generate forged or misleading financial documents.
  • Harassment: Using the communication analysis tools to stalk or harass an opposing party.
  • Unauthorized Surveillance: Using the Sentinel Engine, Entity Resolution Graph, or Leakage Analysis to monitor individuals without lawful authority or proper legal process.
  • Reverse Engineering: Attempting to reverse-engineer, decompile, or extract the source code of the platform or its proprietary algorithms.

We reserve the right to terminate accounts found violating these prohibitions without refund.

Evidentiary Forgery & Account Termination

10. Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY LAW, EXIT PROTOCOL INC. SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES, OR ANY LOSS OF PROFITS OR REVENUES, WHETHER INCURRED DIRECTLY OR INDIRECTLY, OR ANY LOSS OF DATA, USE, GOODWILL, OR OTHER INTANGIBLE LOSSES.

IN NO EVENT SHALL OUR AGGREGATE LIABILITY EXCEED THE AMOUNT YOU PAID FOR THE SERVICE IN THE TWELVE (12) MONTHS PRECEDING THE CLAIM.

11. Data Retention & Deletion

Upon deletion of a case from your dashboard, all corresponding forensic artifacts — including transaction data, uploaded evidence, AI-generated analyses, and any data synced from third-party integrations — are permanently removed from our active servers.

Routine backup archives containing deleted data are purged on an automated 30-day schedule. After this period, your data is irrecoverable.

You may request full account deletion at any time by contacting legal@exitprotocols.com.

12. Intellectual Property

The Exit Protocol platform, including its source code, algorithms (LIBR Engine, Sentinel Engine, Grand Strategist, Impeachment Engine, Entity Resolution Graph), user interface designs, documentation, and branding, is the exclusive intellectual property of Exit Protocol Inc.

You retain full ownership of all data you upload to or create within the Service. By using the Service, you grant Exit Protocol a limited, non-exclusive license to process your data solely for the purpose of providing the Service to you.

Intellectual Property & Proprietary Algorithms

13. Professional Standards & Compliance

13.1 SSFS No. 1

Exit Protocol is designed to align with the American Institute of Certified Public Accountants (AICPA) Statement on Standards for Forensic Services (SSFS) No. 1. The platform produces standardized, audit-ready output conforming to SSFS No. 1 requirements. SSFS No. 1 explicitly allows forensic practitioners to utilize advanced analytical tools and proprietary software methodologies, provided the practitioner understands the tool and maintains control over the working papers.

13.2 Intended Professional Use

In complex trials, law firms can export Exit Protocol data packages directly to a licensed CPA. The CPA reviews the automated findings, validates the OCR accuracy, and may adopt the algorithmic report as their own expert work product. This hybrid approach satisfies SSFS No. 1 requirements while reducing manual labor.

13.3 Daubert Compatibility

The deterministic core of the platform (LIBR tracing, Impeachment Engine, Entity Resolution Graph) is designed to satisfy evidentiary admissibility standards under the Daubert framework. Its methodology is transparent, testable, and replicable. However, specific admissibility determinations are made by individual courts and may depend on sponsoring expert testimony.

14. Governing Law & Arbitration

These Terms shall be governed by the laws of the State of Delaware, USA. Any dispute arising from these Terms shall be resolved through binding arbitration in Delaware, USA, in accordance with the rules of the American Arbitration Association (AAA).

Contact: For questions about these Terms, contact us at legal@exitprotocols.com.

SECURITY ALERT: DATA EXPORT BLOCKED // INTERNAL USE ONLY